eapol_test
BuzzSaw Code
buzzsaw.code at gmail.com
Fri Feb 21 17:33:30 UTC 2025
I must be cursed - test install with the default site on a RHEL8 host,
FreeRADIUS 3.2.7 built from source, running eapol_test locally on the
server:
(0) Received Access-Request Id 0 from 127.0.0.1:58220 to
127.0.0.1:1812 length 134
Dropping packet without response because of error: Received packet
from 127.0.0.1 with invalid Message-Authenticator! (Shared secret is
incorrect.) (from client localhost)
Using eapol_test -c test.conf -a 127.0.0.1 -stesting123
Reading configuration file 'test.conf'
Line: 1 - start of a new network block
key_mgmt: 0x1
identity - hexdump_ascii(len=10):
6d 79 75 73 65 72 6e 61 6d 65 myusername
proto: 0x2
eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00
ca_cert - hexdump_ascii(len=32):
2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 /etc/pki/tls/cer
74 73 2f 63 61 2d 62 75 6e 64 6c 65 2e 63 72 74 ts/ca-bundle.crt
client_cert - hexdump_ascii(len=29):
2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 /etc/pki/tls/cer
74 73 2f 73 65 72 76 65 72 2e 70 65 6d ts/server.pem
private_key - hexdump_ascii(len=31):
2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 70 72 69 /etc/pki/tls/pri
76 61 74 65 2f 73 65 72 76 65 72 2e 6b 65 79 vate/server.key
private_key_passwd - hexdump_ascii(len=5):
38 30 32 31 78 8021x
Priority group 0
id=0 ssid=''
Authentication server 127.0.0.1:1812
RADIUS local address: 127.0.0.1:54371
ENGINE: Loading builtin engines
ENGINE: Loading builtin engines
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Sending fake EAP-Request-Identity
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=48 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=10):
6d 79 75 73 65 72 6e 61 6d 65 myusername
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=15)
TX EAP -> RADIUS - hexdump(len=15): 02 30 00 0f 01 6d 79 75 73 65 72 6e 61 6d 65
Encapsulating EAP message into a RADIUS packet
Learned identity from EAP-Response-Identity - hexdump(len=10): 6d 79
75 73 65 72 6e 61 6d 65
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=0 length=134
Attribute 80 (Message-Authenticator) length=18
Value: 00000000000000000000000000000000
Attribute 1 (User-Name) length=12
Value: 'myusername'
Attribute 4 (NAS-IP-Address) length=6
Value: 127.0.0.1
Attribute 31 (Calling-Station-Id) length=19
Value: '02-00-00-00-00-01'
Attribute 12 (Framed-MTU) length=6
Value: 1400
Attribute 61 (NAS-Port-Type) length=6
Value: 19
Attribute 6 (Service-Type) length=6
Value: 2
Attribute 77 (Connect-Info) length=24
Value: 'CONNECT 11Mbps 802.11b'
Attribute 79 (EAP-Message) length=17
Value: 0230000f016d79757365726e616d65
RADIUS: Send 134 bytes to the server
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
STA 02:00:00:00:00:01: Resending RADIUS message (id=0)
RADIUS: Send 134 bytes to the server
Next RADIUS client retransmit in 6 seconds
STA 02:00:00:00:00:01: Resending RADIUS message (id=0)
RADIUS: Send 134 bytes to the server
Next RADIUS client retransmit in 12 seconds
STA 02:00:00:00:00:01: Resending RADIUS message (id=0)
RADIUS: Send 134 bytes to the server
Next RADIUS client retransmit in 24 seconds
EAPOL test timed out
EAPOL: EAP key not available
EAPOL: EAP Session-Id not available
WPA: Clear old PMK and PTK
MPPE keys OK: 0 mismatch: 1
FAILURE
This doesn't appear to be a FreeRADIUS issue as the shared secret
works just fine with radclient:
# echo "User-Name = somebody,User-Password = dontcare" | radclient -x
-s 127.0.0.1 auth testing123
Sent Access-Request Id 47 from 0.0.0.0:41624 to 127.0.0.1:1812 length 66
Message-Authenticator = 0x
User-Name = "somebody"
User-Password = "dontcare"
Cleartext-Password = "dontcare"
Received Access-Reject Id 47 from 127.0.0.1:1812 to 127.0.0.1:41624 length 38
Message-Authenticator = 0x10406f6c14a47ecf14b56f738188a885
(0) -: Expected Access-Accept got Access-Reject
Packet summary:
Accepted : 0
Rejected : 1
Lost : 0
Passed filter : 0
Failed filter : 1
Tried with the eapol_client distributed with RHEL8 as well as once
built from the latest sources.
On Fri, Feb 21, 2025 at 11:06 AM Alan DeKok <aland at deployingradius.com> wrote:
>
> On Feb 21, 2025, at 10:52 AM, BuzzSaw Code <buzzsaw.code at gmail.com> wrote:
> >
> > Is eapol_test still the preferred way to test the various EAP methods
> > ? Or is there a better tool for validating the FreeRADIUS
> > configuration that can be semi-automated ?
>
> eapol_test is the best thing to use.
>
> Sample configurations are in src/tests/eap*.conf
>
> Alan DeKok.
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
More information about the Freeradius-Users
mailing list